Finals Deck Flashcards
Encryption
renders message unreadable to everyone except intended recipient
Decryption
Revealing original meaning of encrypted message
Symmetric Key Encryption
Same key is used to encrypt and decrypt message
Computationally Secure
takes too long for a hacker to crack code
Hash Function
maps input of any size into output of fixed size
Certificate Authority
verifies digital signature of a trusted org.
Tapping
Eavesdropping on telephone lines
Sniffing
Eavesdropping on computer network
Radiation
wires give off electric signal that can be intercepted
Web Scraping
when computer program searches the web for info
Malware
malicious software designed to cause damage or loss of control to a computer
Computer Virus
Subset of Malware
software that attaches to other programs in order to be executed
Worm
Subset of Malware
similar to virus but runs on its own
Trojan Horse
Subset of Malware
software that appears to be benign, but actually runs malicious software in the background
Phishing
Subset of Malware
email or text that tricks user into giving sensitive information
Denial of Service Attack
Subset of Malware
overwhelm website by overloading with traffic
Spam
Subset of Malware
Junk email
Ransomware
Subset of Malware
software that threatens to publish files and/or prevents use of computer until ransom is paid
Computer Security
Policies, Procedures, and Technical Measures, to ensure unauthorized access, theft, interruption or physical damage does not occur to information systems
Attack Surface
Different places where a hacker can gain data
Discovery Request
legal request for electronic documents
Acceptable Use Policy
states acceptable uses and USERS of information and computers
Data
Raw Facts
Information
Data that is shaped into a meaningful form
Information Technology
all hardware and software that firms need to achieve business objectives
Information System
A set of interrelated components that collect, store, process, and distribute information
Business Intelligence
IT to help users make better business decisions
Management IS
IS + consideration of behavioral issues
Business Processes
collection of activities required to produce a product or service
Manufacturing and Production (BP)
Producing and Delivering products / services
Sales and Marketing
Selling the organizations products / services
Finance and Accounting
Managing the organizations financial records
Human Resources
Attracting, Maintaining, and Developing orgs. labour force
Norms
How you are expected to behave
Values
why you behave a certain way
responsibility
accepting costs duties and obligations for decisions
accountability
mechanism to determine who is responsible
liability
laws exist to allow individuals to recover damages from harm
due process
make sure laws are justly applied, i.e. appeal
privacy
right for individual to be left alone, free from surveillances
web beacons
track that you viewed a certain item
spyware
software that tracks ‘ gathers info without users knowledge
NORA
non-obvious relationship awareness
combines data on one person from different sources to build a complete profile